420 research outputs found

    Getting pwn'd by AI: Penetration Testing with Large Language Models

    Full text link
    The field of software security testing, more specifically penetration testing, is an activity that requires high levels of expertise and involves many manual testing and analysis steps. This paper explores the potential usage of large-language models, such as GPT3.5, to augment penetration testers with AI sparring partners. We explore the feasibility of supplementing penetration testers with AI models for two distinct use cases: high-level task planning for security testing assignments and low-level vulnerability hunting within a vulnerable virtual machine. For the latter, we implemented a closed-feedback loop between LLM-generated low-level actions with a vulnerable virtual machine (connected through SSH) and allowed the LLM to analyze the machine state for vulnerabilities and suggest concrete attack vectors which were automatically executed within the virtual machine. We discuss promising initial results, detail avenues for improvement, and close deliberating on the ethics of providing AI-based sparring partners

    Queueing systems with different types of renovation mechanism and thresholds as the mathematical models of active queue management mechanism

    Get PDF
    This article is devoted to some aspects of using the renovation mechanism (different types of renovation are considered, definitions and brief overview are also given) with one or several thresholds as the mathematical models of active queue management mechanisms. The attention is paid to the queuing systems in which a threshold mechanism with renovation is implemented. This mechanism allows to adjust the number of packets in the system by dropping (resetting) them from the queue depending on the ratio of a certain control parameter with specified thresholds at the moment of the end of service on the device (server) (in contrast to standard RED-like algorithms, when a possible drop of a packet occurs at the time of arrivals of next packets in the system). The models with one, two and three thresholds with different types of renovation are under consideration. It is worth noting that the thresholds determine not only from which place in the buffer the packets are dropped, but also to which the reset of packets occurs. For some of the models certain analytical and numerical results are obtained (the references are given), some of them are only under investigation, so only the mathematical model and current results may be considered. Some results of comparing classic RED algorithm with renovation mechanism are presented.Π Π°Π±ΠΎΡ‚Π° посвящСна Π½Π΅ΠΊΠΎΡ‚ΠΎΡ€Ρ‹ΠΌ аспСктам использования ΠΌΠ΅Ρ…Π°Π½ΠΈΠ·ΠΌΠ° обновлСния (Ρ€Π°Π·Π»ΠΈΡ‡Π½Ρ‹Π΅ Π²Π°Ρ€ΠΈΠ°Π½Ρ‚Ρ‹ обновлСния рассмотрСны, опрСдСлСния ΠΈ ΠΊΡ€Π°Ρ‚ΠΊΠΈΠΉ ΠΎΠ±Π·ΠΎΡ€ прСдставлСны) с ΠΎΠ΄Π½ΠΈΠΌ ΠΈΠ»ΠΈ нСсколькими ΠΏΠΎΡ€ΠΎΠ³Π°ΠΌΠΈ Π² качСствС матСматичСских ΠΌΠΎΠ΄Π΅Π»Π΅ΠΉ ΠΌΠ΅Ρ…Π°Π½ΠΈΠ·ΠΌΠΎΠ² Π°ΠΊΡ‚ΠΈΠ²Π½ΠΎΠ³ΠΎ управлСния очСрСдями. ΠžΠΏΠΈΡΠ°Π½Ρ‹ систСмы массового обслуТивания, Π² ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Ρ… Ρ€Π΅Π°Π»ΠΈΠ·ΠΎΠ²Π°Π½ ΠΌΠ΅Ρ…Π°Π½ΠΈΠ·ΠΌ обновлСния с ΠΏΠΎΡ€ΠΎΠ³Π°ΠΌΠΈ, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠΉ ΡƒΠΏΡ€Π°Π²Π»ΡΡ‚ΡŒ числом заявок Π² систСмС ΠΏΡƒΡ‚Π΅ΠΌ ΠΈΡ… сброса ΠΈΠ· накопитСля Π² зависимости ΠΎΡ‚ значСния Π½Π΅ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠ³ΠΎ ΡƒΠΏΡ€Π°Π²Π»ΡΡŽΡ‰Π΅Π³ΠΎ ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Π° ΠΈ ΠΏΠΎΡ€ΠΎΠ³ΠΎΠ²Ρ‹Ρ… Π·Π½Π°Ρ‡Π΅Π½ΠΈΠΉ. Бброс заявок ΠΈΠ· накопитСля происходит Π² ΠΌΠΎΠΌΠ΅Π½Ρ‚ окончания обслуТивания заявки Π½Π° ΠΏΡ€ΠΈΠ±ΠΎΡ€Π΅, Ρ‡Ρ‚ΠΎ ΠΎΡ‚Π»ΠΈΡ‡Π°Π΅Ρ‚ Π΄Π°Π½Π½Ρ‹ΠΉ ΠΌΠ΅Ρ…Π°Π½ΠΈΠ·ΠΌ сброса ΠΎΡ‚ RED-ΠΏΠΎΠ΄ΠΎΠ±Π½Ρ‹Ρ… Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΠΎΠ², для ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Ρ… сброс Π²ΠΎΠ·ΠΌΠΎΠΆΠ΅Π½ Π² ΠΌΠΎΠΌΠ΅Π½Ρ‚ поступлСния Π² систСму. ΠŸΡ€Π΅Π΄ΡΡ‚Π°Π²Π»Π΅Π½Ρ‹ ΠΌΠΎΠ΄Π΅Π»ΠΈ с ΠΎΠ΄Π½ΠΈΠΌ, двумя ΠΈΠ»ΠΈ трСмя ΠΏΠΎΡ€ΠΎΠ³Π°ΠΌΠΈ. Π’ этих модСлях ΠΏΠΎΡ€ΠΎΠ³ΠΎΠ²Ρ‹Π΅ значСния ΠΎΠΏΡ€Π΅Π΄Π΅Π»ΡΡŽΡ‚ Π½Π΅ Ρ‚ΠΎΠ»ΡŒΠΊΠΎ мСсто, с ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠ³ΠΎ Π² Π½Π°ΠΊΠΎΠΏΠΈΡ‚Π΅Π»Π΅ начинаСтся сброс заявок, Π½ΠΎ ΠΈ Π΄ΠΎ ΠΊΠ°ΠΊΠΎΠΉ ΠΏΠΎΠ·ΠΈΡ†ΠΈΠΈ заявки ΠΌΠΎΠ³ΡƒΡ‚ Π±Ρ‹Ρ‚ΡŒ ΡΠ±Ρ€ΠΎΡˆΠ΅Π½Ρ‹. Для Π½Π΅ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Ρ… ΠΈΠ· описываСмых ΠΌΠΎΠ΄Π΅Π»Π΅ΠΉ ΡƒΠΆΠ΅ ΠΏΠΎΠ»ΡƒΡ‡Π΅Π½Ρ‹ аналитичСскиС ΠΈ числСнныС Ρ€Π΅Π·ΡƒΠ»ΡŒΡ‚Π°Ρ‚Ρ‹ (ссылки Π½Π° Ρ€Π°Π±ΠΎΡ‚Ρ‹ прСдставлСны), Π½ΠΎ большая Ρ‡Π°ΡΡ‚ΡŒ ΠΌΠΎΠ΄Π΅Π»Π΅ΠΉ находится Π² процСссС изучСния, поэтому прСдставлСны Ρ‚ΠΎΠ»ΡŒΠΊΠΎ описания ΠΈ Π½Π΅ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ Ρ‚Π΅ΠΊΡƒΡ‰ΠΈΠ΅ Π΄Π°Π½Π½Ρ‹Π΅. ΠŸΡ€ΠΈΠ²Π΅Π΄Π΅Π½Ρ‹ Π½Π΅ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ Ρ€Π΅Π·ΡƒΠ»ΡŒΡ‚Π°Ρ‚Ρ‹ сравнСния классичСского Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΠ° RED с ΠΌΠ΅Ρ…Π°Π½ΠΈΠ·ΠΌΠΎΠΌ обновлСния

    Senior Computer Science Students’ Task and Revised Task Interpretation While Engaged in Programming Endeavor

    Get PDF
    Developing a computer program is not an easy task. Studies reported that a large number of computer science students decided to change their major due to the extreme challenge in learning programming. Fortunately, studies also reported that learning various self-regulation strategies may help students to continue studying computer science. This study is interested in assessing students’ self-regulation, in specific their task understanding and its revision during programming endeavors. Task understanding is specifically selected because it affects the entire programming endeavor. In this qualitative case study, two female and two male senior computer science students were voluntarily recruited as research participants. They were asked to think aloud while answering five programming problems. Before solving the problem, they had to explain their understanding of the task and after that answer some questions related to their problem-solving process. The participants’ problem-solving process were video and audio-recorded, transcribed, and analyzed. This study found that the participants’ were capable of tailoring their problem-solving approach to the task types, including when understanding the tasks. Given enough time, the participants can understand the problem correctly. When the task is complicated, the participants will gradually update their understanding during the problem-solving endeavor. Some situations may have prevented the participants from understanding the task correctly, including overconfidence, being overwhelmed, utilizing an inappropriate presentation technique, or drawing knowledge from irrelevant experience. Last, the participants tended to be inexperienced in managing unfavorable outcomes

    Towards efficient battery swapping service operation under battery heterogeneity

    Get PDF
    The proliferation of electric vehicles (EVs) has posed significant challenges to the existing power grid infrastructure. It thus becomes of vital importance to efficiently manage the Electro-Mobility for large demand from EVs. Due to limited cruising range of EVs, vehicles have to make frequent stops for recharging, while long charging period is one major concern under plug-in charging. We herein leverage battery swapping (BS) technology to provide an alternative charging service, which substantially reduces the charging duration (from hours down to minutes). Concerning in practice that various battery is generally not compatible with each other, we thus introduce battery heterogeneity into the swapping service, concerning the case that different types of EVs co-exist. A battery heterogeneity-based swapping service framework is then proposed. Further with reservations for swapping service enabled, the demand load can be anticipated at BS stations as a guidance to alleviate service congestion. Therefore, potential hotspots can be avoided. Results show the performance gains under the proposed scheme by comparing to other benchmarks, in terms of service waiting time, etc. In particular, the diversity of battery stock across the network can be effectively managed

    Advanced flight control system study

    Get PDF
    The architecture, requirements, and system elements of an ultrareliable, advanced flight control system are described. The basic criteria are functional reliability of 10 to the minus 10 power/hour of flight and only 6 month scheduled maintenance. A distributed system architecture is described, including a multiplexed communication system, reliable bus controller, the use of skewed sensor arrays, and actuator interfaces. Test bed and flight evaluation program are proposed

    Natural stone sludge as secondary raw materials: towards a new sustainable recovery process

    Get PDF
    L'abstract Γ¨ presente nell'allegato / the abstract is in the attachmen

    2012 XSEDE User Satisfaction Survey

    Get PDF
    This is the final report from the 2012 XSEDE User Satisfaction Survey.National Science Foundation OCI-1053575Ope

    E-SCAPE New tools and new opportunities for the localization of Expo 2015 general interest services along the Canale Cavour, a backbone of the Milan-Turin urban region

    Get PDF
    Publication of the Alta Scuola Politecnica project "E-SCAPE. New tools and new opportunities for the localization of Expo 2015 general interest services along the Canale Cavour, a backbone of the Milan-Turin urban region
    • …
    corecore